Sie sind auf Seite 1von 6

ABSTRACT

With the Internet, computer and network, security has become more important
than ever. Increasingly we hear malicious individuals breaking into corporate and
government computer systems around the world, the media calls these people as hackers.
That definition is not entirely accurate. A cracker on the other hand, is someone who
breaks into computers often to do something malicious.
This dissertation describes ways to protect our system from crackers and other
behavior that could damage our computer application. The proposed thesis Comparative
tudy of Cryptographic Algorithms and Implementation of !A Algorithm" is done for
safe transfer of data across the internet. The data to be transferred is encrypted with the
help of cryptography and send via the internet. The person who has to access has to check
the integrity of the send file. That whether he has only the authori#ed person who knows
the key code and who has this software can get the data file back.
Modules:
$ata %ncryption & decryption techni'ues
Cryptography algorithms(!A,$%,A%)
Comparative study on algorithms
Implementation of !A
*
ACKNOWLEDGEMENT
I take this privilege to e+press a few words of gratitude and respect to all who
helped me in completion of this dissertation.
I mention my profound gratitude to my dissertation guide Mrs. V.Rekha., MCA,
M.Phl, Se!or Le"#urer, ! De$ar#%e!# o& Mas#er o& Co%$u#er A$$l"a#o!,
Mala% E!'!eer!' Colle'e, Mala%, Vllu$ura%, for his guidance throughout my
dissertation.
I am e+tremely thankful to my dissertation guide Mrs. V.Rekha., MCA, M.Phl,
for his guidance and encouragement throughout my dissertation work.
,inally my special thanks to my parents for their continued support and
encouragement. -y acknowledgement is also due to many others who have rendered
their help in many occasions during my dissertation work.
A.S(BAT)RA DEV*
.
TABLE O+ CONTENTS
/A0% 12
ABSTRACT,,,,,,,,,,,,,,,,,,,,,,,,......... -
ACKNOWLWDGEMENTS,,,,,,,,,,,,,,,,,,,.. .
L*ST O+ +*G(RES,,,,,,,,,,,,,,,,,,,,,,, /
L*ST O+ TABLES,,,,,,,,,,,,,,,,,,,,,,,.. 0
1. *NTROD(CT*ON,,,,,,,,,,,,,,,,,,,,,,.. 12
3. SCOPE O+ T)E D*SSERTAT*ONS,,,,,,,,,,,,,,, 13
4. CR5PTOGRAP)56BAS*C TERM*NOLOG*ES,,,,,,,,,, 14
3.4 Cryptography 5ey 6asics77777777777777777777 4.
3.8 The 5ey /air7777777777777777777777777 4.
3.3 5ey Component77777777777777777777777.. 4.
-. CR5PTOGRAP)5 ALGOR*T)MS,,,,,,,,,,,,,,, 17
*.4 ymmetric (secret key) Algorithms7777777777777777. 49
*.8 Asymmetric (/ublic 5ey) Algorithm77777777.7..77777.. 49
*.3 ymmetric (ecret 5ey) Algorithms777777777..777777 4:
*.* Cycles of ubstitution and /ermutation77777777777777. 4;
*.. Advanced %ncryption tandard (A%)77777777777777... 8<
*.= A% Algorithm777777777777777777777.77.. 84
*.9 Comparison of $% and A%77777777777777777..... 88
*.: Asymmetric (/ublic key) Algorithm777777777777..777 88
*.; !ivest>hamir>Adelman (!A) %ncryption7777777777777 83
*.4< Comparison of ecret 5ey and /ublic 5ey %ncryption7777..777.. 8*
=
*.44 Comparison between the $% and !A7777777777777.. 8.
.. RSA S5STEM DES*GN,,,,,,,,,,,,,,,,,,,,. 38
..4 6lock $iagram777777777777777777777..77... 8=
..4(a). ecured data ,ile Transmission77777777777.77777. 8=
..4(b). ecured data ,ile !eception77777777777777.......77 8=
..8 1eed for ecured $ata Communication777777777777.77. 89
..3 ystem !e'uirements7777777777777777777..77 8;
8. RSA ALGOR*T)M *MPLEMENTAT*ON,,,,,,,,,,,,. 42
=.4 5ey 0eneration777777777777777777777777 3<
=.8 %ncryption77777777777777777777777777 38
=.3 $ecryption7777777777777777777777777... 38
=.* A ?ava Implementation of !A a Transcription of the Algorithm7777. 3*
7. ADVANTAGES AND D*SADVANTAGES,,,,,,,,,,,,. 4.
/. CONCL(S*ON,,,,,,,,,,,,,,,,,,,,,,,, 47
0. +(T(RE EN)ANCEMENTS,,,,,,,,,,,,,,,,,, 4/
12. RE+ERENCES,,,,,,,,,,,,,,,,,,,,,,,. 40
9
L*ST O+ +*G(RES
S.NO T*TLE PAGE NO.
4. ymmetric key work flow 49
8. Asymmetric key work flow 49
3. Cycles of ubstitution and /ermutation 4;
*. A% algorithm key generation 84
.. ecured data ,ile Transmission 8=
=. ecured data ,ile !eception 8=
L*ST O+ TABLES
:
S.NO T*TLE PAGE NO.
4. Comparison of $% and A% 88
8. Comparison of symmetric and asymmetric key Algorithms 8*
3. Comparison of $% and !A 8.
*. !A 5ey generation 3<
.. /ublic key and secret key 38
;

Das könnte Ihnen auch gefallen